{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:48:22Z","timestamp":1743036502036,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319659299"},{"type":"electronic","value":"9783319659305"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65930-5_39","type":"book-chapter","created":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T14:18:51Z","timestamp":1502720331000},"page":"492-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mapping of Enterprise Governance of IT Practices Metamodels"],"prefix":"10.1007","author":[{"given":"Renato","family":"Lourinho","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Mira da Silva","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Beatrix","family":"Barafort","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,15]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-14547-1","volume-title":"Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value, Featuring COBIT 5","author":"S De Haes","year":"2015","unstructured":"De Haes, S., Van Grembergen, W.: Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value, Featuring COBIT 5. Springer, New York (2015)"},{"key":"39_CR2","unstructured":"Symons, C.: IT governance framework: structures, processes and communication. IT Governance Series, Forrester Research (2005)"},{"key":"39_CR3","unstructured":"Coleman, T., Chatfield, A.: Promises and successful practice in IT governance: a survey of Australian senior IT managers. In: 15th Pacific Asia Conference on Information Systems: Quality Research in Pacific, PACIS 2011, Queensland, pp. 1\u201315 (2011)"},{"issue":"1","key":"39_CR4","first-page":"157","volume":"27","author":"RS Debreceny","year":"2011","unstructured":"Debreceny, R.S., Gray, G.L.: IT governance and process maturity: a multinational field study. J. Inf. Syst. 27(1), 157\u2013188 (2011)","journal-title":"J. Inf. Syst."},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Sahibudin, S., Sharifi, M., Ayat, M.: Combining ITIL, COBIT and ISO\/IEC 27002 in order to design a comprehensive IT framework in organizations. In: Asia International Conference on Modeling (2008)","DOI":"10.1109\/AMS.2008.145"},{"key":"39_CR6","unstructured":"IT Governance Institute: Global Status Report on the Governance of Enterprise IT, ISACA, COBIT 5: Enabling Processes (2011)"},{"issue":"2","key":"39_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/10580530902797532","volume":"26","author":"M Winniford","year":"2009","unstructured":"Winniford, M., Conger, S., Erickson-Harris, L.: Confusion in the ranks: IT service management practice and terminology. Inf. Syst. Manag. 26(2), 153\u2013163 (2009)","journal-title":"Inf. Syst. Manag."},{"key":"39_CR8","unstructured":"Hill, P., Turbitt, K.: Combine ITIL and COBIT to meet business challenges. BMC Softw. (2006)"},{"issue":"2","key":"39_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1080\/10580530902794760","volume":"26","author":"P Willson","year":"2009","unstructured":"Willson, P., Pollard, C.: Exploring IT governance in theory and practice in a large multinational organization in Australia. Inf. Syst. Manag. 26(2), 98\u2013109 (2009)","journal-title":"Inf. Syst. Manag."},{"issue":"6","key":"39_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/52.805473","volume":"16","author":"JW Moore","year":"1999","unstructured":"Moore, J.W.: An integrated collection of software engineering standards. J. IEEE Softw. 16(6), 51\u201357 (1999)","journal-title":"J. IEEE Softw."},{"key":"39_CR11","first-page":"35","volume":"3","author":"EJ Oud","year":"2005","unstructured":"Oud, E.J.: The value to IT of using international standards. Inf. Syst. Control J. 3, 35\u201339 (2005)","journal-title":"Inf. Syst. Control J."},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MS.2003.1231159","volume":"20","author":"I Aaen","year":"2003","unstructured":"Aaen, I.: Software process improvement: blueprints versus recipes. IEEE Softw. J. 20, 86\u201393 (2003)","journal-title":"IEEE Softw. J."},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Gama, N., Sousa, P., Mira da Silva, M.: Integrating enterprise architecture and IT service management. In: 21st International Conference on Information Systems Development, Italy (2012)","DOI":"10.1007\/978-1-4614-7540-8_12"},{"issue":"2","key":"39_CR14","doi-asserted-by":"crossref","first-page":"66","DOI":"10.22279\/navus.2012.v2n2.p66-77.77","volume":"2","author":"M Gehrmann","year":"2012","unstructured":"Gehrmann, M.: Combining ITIL, COBIT and ISO\/IEC 27002 for structuring comprehensive information technology for management in organizations. Navus: Revista de Gest\u00e3o e Tecnologia 2(2), 66\u201377 (2012)","journal-title":"Navus: Revista de Gest\u00e3o e Tecnologia"},{"issue":"3","key":"39_CR15","first-page":"1","volume":"43","author":"P Nastase","year":"2009","unstructured":"Nastase, P., Nastase, F., Ionescu, C.: Challenges generated by the implementation of the IT standards CobiT 4.1, ITIL v3 and ISO\/IEC 27002 in enterprises. Econ. Comput. Econ. Cybern. Stud. Res. 43(3), 1\u201316 (2009)","journal-title":"Econ. Comput. Econ. Cybern. Stud. Res."},{"issue":"3","key":"39_CR16","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1002\/spip.266","volume":"3","author":"S Biffl","year":"2006","unstructured":"Biffl, S., Winkler, D., H\u00f6rn, R., Wetzel, H.: Software process improvement in Europe: potential of the new V-Model XT and research issues. Softw. Process: Improv. Pract. 3(3), 229\u2013238 (2006)","journal-title":"Softw. Process: Improv. Pract."},{"key":"39_CR17","unstructured":"Liao, L., Qu, Y., Leung, H.K.N.: A software process ontology and its application. In: Proceedings of 4th International Semantic Web Conference (ISWC 2005), Galway, Ireland (2005)"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Mataracioglu, T., Ozkan, S.: Governing information security in conjunction with COBIT and ISO 27001. arXiv preprint arXiv:1108:2150 (2011)","DOI":"10.5121\/ijcsit.2011.3321"},{"issue":"4","key":"39_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jeis.2012100101","volume":"8","author":"R Pereira","year":"2012","unstructured":"Pereira, R., Mira da Silva, M.: Designing a new integrated IT governance and IT management framework based on both scientific and practitioner viewpoint. Int. J. Enterp. Inf. Syst. 8(4), 1\u201343 (2012)","journal-title":"Int. J. Enterp. Inf. Syst."},{"issue":"5","key":"39_CR20","first-page":"23","volume":"11","author":"H Susanto","year":"2011","unstructured":"Susanto, H., Almunawar, M.N., Tuan, Y.C.: Information security management system standards: a comparative study of the big five. Int. J. Electr. Comput. Sci. 11(5), 23\u201329 (2011)","journal-title":"Int. J. Electr. Comput. Sci."},{"issue":"2","key":"39_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cose.2005.02.002","volume":"24","author":"B Von Solms","year":"2005","unstructured":"Von Solms, B.: Information security governance: COBIT or ISO 17799 or both? Comput. Secur. 24(2), 99\u2013104 (2005)","journal-title":"Comput. Secur."},{"key":"39_CR22","doi-asserted-by":"crossref","unstructured":"Vicente, M., Gama, N., Mira da Silva, M.: Using ArchiMate to represent ITIL metamodel. In: IEEE International Conference on Business Informatics, pp. 270\u2013275 (2013)","DOI":"10.1109\/CBI.2013.45"},{"key":"39_CR23","first-page":"27","volume":"6","author":"SL Schlindwein","year":"2004","unstructured":"Schlindwein, S.L., Ison, R.: Human knowing and perceived complexity: implications for systems practice. Emerg.: Complex. Organ. 6, 27\u201332 (2004)","journal-title":"Organ."},{"key":"39_CR24","unstructured":"ISACA, COBIT 5: A Business Framework for the Governance and Management of Enterprise IT (2012)"},{"key":"39_CR25","unstructured":"Information Technology \u2013 Security Techniques \u2013 Information Security Management Systems \u2013 Overview and Vocabulary, 3rd edn. ISO Standard 27000 (2014)"},{"key":"39_CR26","unstructured":"Information Technology \u2013 Security Techniques \u2013 Information Security Management Systems \u2013 Requirements, 2nd edn. ISO Standard 27001 (2013)"},{"key":"39_CR27","first-page":"2","volume":"25","author":"M Nicho","year":"2016","unstructured":"Nicho, M., Muamaar, S.: Towards a taxonomy of challenges in an integrated IT governance framework implementation. J. Int. Technol. Inf. Manag. 25, 2 (2016)","journal-title":"J. Int. Technol. Inf. Manag."},{"key":"39_CR28","unstructured":"Information Technology \u2013 Process Assessment \u2013 Process Capability Assessment Model for Information Security Management \u2013 ISO Technical Specification 33072 (2016)"},{"key":"39_CR29","unstructured":"Information Technology \u2013 Process Assessment \u2013 Process Reference Model for Information Security Management, ISO Technical Specification 33052 (2016)"},{"issue":"2","key":"39_CR30","first-page":"13","volume":"6","author":"R Sheikhpour","year":"2012","unstructured":"Sheikhpour, R., Modiri, N.: An approach to map COBIT processes to ISO\/IEC 27001 information security management controls. Int. J. Secur. Appl. 6(2), 13\u201328 (2012)","journal-title":"Int. J. Secur. Appl."},{"key":"39_CR31","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1016\/j.procs.2016.09.221","volume":"100","author":"K Haufe","year":"2016","unstructured":"Haufe, K., Colomo-Palacios, R., Dzombeta, S., Brandis, K., Stantchev, V.: Security management standards: a mapping. Procedia Comput. Sci. 100, 755\u2013761 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"39_CR32","series-title":"The Enterprise Engineering Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01310-2","volume-title":"Enterprise Architecture at Work: Modeling, Communication and Analysis","author":"M Lankhorst","year":"2009","unstructured":"Lankhorst, M.: Enterprise Architecture at Work: Modeling, Communication and Analysis. The Enterprise Engineering Series, 2nd edn. Springer, Heidelberg (2009)","edition":"2"},{"key":"39_CR33","unstructured":"The Open Group: ArchiMate 2.0 Specification (2012)"},{"key":"39_CR34","unstructured":"Almeida, R., Pinto, P., Mira da Silva, M.: Using ArchiMate to integrate COBIT 5 and COSO metamodels. In: European, Mediterranean & Middle Eastern Conference on Information Systems, Krakow, Poland (2016A)"},{"key":"39_CR35","unstructured":"Almeida, R., Pinto, P., Mira da Silva, M.: Using ArchiMate to assess COBIT 5 and ITIL implementations. In: 25th International Conference on Information Systems Development, Poland (2016B)"},{"key":"39_CR36","unstructured":"Luxembourg Institute of Science and Technology: TIPA for ITIL. http:\/\/www.tipaonline.org"},{"key":"39_CR37","unstructured":"Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E.: An integrated conceptual model for information system security risk management and enterprise architecture management based on TOGAF, ArchiMate, IAF and DoDAF. Luxembourg Institute of Science and Technology Technical report (2016)"},{"key":"39_CR38","unstructured":"Goeken, M., Alter, S.: Towards conceptual metamodeling of IT governance frameworks approach-use-benefits. In: 42nd Hawaii International Conference on System Sciences (2009)"},{"key":"39_CR39","unstructured":"Hinkelmann, K.: Meta-modeling and Modeling Languages. FHNW School of Business, University of Applied Sciences, Northwestern Switzerland"},{"key":"39_CR40","first-page":"132","volume":"3380","author":"M Roux-Rouqui\u00e9","year":"2005","unstructured":"Roux-Rouqui\u00e9, M., Soto, M.: Virtualizations in systems biology: metamodels and modeling languages for semantic data integration. Trans. Comput. Syst. Biol. I 3380, 132 (2005)","journal-title":"Trans. Comput. Syst. Biol. I"},{"key":"39_CR41","doi-asserted-by":"crossref","unstructured":"Sch\u00fctte, R., Rotthowe, T.: The guidelines of modeling \u2013 an approach to enhance the quality in information models. In: Ling, T.W., Ram, S. (ed.) Conceptual Modeling ER 98, Singapore, pp. 240\u2013254 (1998)","DOI":"10.1007\/978-3-540-49524-6_20"},{"key":"39_CR42","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-16283-1_13","volume-title":"Software Services for e-World","author":"D Milicevic","year":"2010","unstructured":"Milicevic, D., Goeken, M.: Ontology-based evaluation of ISO 27001. In: Cellary, W., Estevez, E. (eds.) I3E 2010. IAICT, vol. 341, pp. 93\u2013102. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-16283-1_13"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65930-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:10:58Z","timestamp":1710328258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-65930-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319659299","9783319659305"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65930-5_39","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"15 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}